• Title/Summary/Keyword: Vector backbone

Search Result 19, Processing Time 0.046 seconds

Analysis of junction between T-DNA and plant genome in insect resistance GM Chinese cabbage (해충저항성 GM 배추에서 T-DNA와 식물체 게놈의 인접 부위 분석)

  • Lim, Sun-Hyung;Park, Seung-Hye;Kim, Jung-Hwan;Kim, Na-Young;Won, So-Youn;Lee, Si-Myung;Shin, Kong-Sik;Woo, Hee-Jong;Kim, Dong-Hern;Cho, Hyun-Suk
    • Journal of Plant Biotechnology
    • /
    • v.35 no.2
    • /
    • pp.101-108
    • /
    • 2008
  • The Agrobacterium-mediated transformation has been successfully used method to introduce foreign genes into some monocotyledonous as well as a large number of dicotyledonous plants genome, We developed transgenic Chinese cabbage plants with insect-resistance gene, modified CryIAc, by Agrobacterium-transformation and confirmed transgene copy number by Southern blot analysis. We confirmed that twenty-nine out of 46 transgenic Chinese cabbage plants have single copy of CryIAc. To obtain the sequences information on the transferred DNA (T-DNA) integration into plant genome, we analyzed left border (LB) flanking sequences by genome walking (GW) PCR method. Out of 46 transgenic Chinese cabbage plants examined, 37 carried the vector backbone sequences. This result indicates that the transfer of the vector backbone from the binary vectors resulted mainly from inefficient termination of LB site. Analysis of T-DNA LB flanking region of 9 transgenic Chinese cabbage plants without vector backbone revealed that all LB ends were not conserved and nucleotides up to 36bp from the LB cleavage site were deleted.

Molecular characterization of lepidopteran pest-resistant transgenic rice events expressing synthetic Cry1Ac

  • Lee, Kyeong-Ryeol;Shin, Kong Sik;Suh, Seok Cheol;Kim, Ki Young;Jeon, Yong Hee;Park, Beom Seok;Kim, Ju-Kon;Kweon, Soon-Jong;Lee, Yeon-Hee
    • Plant Biotechnology Reports
    • /
    • v.3 no.4
    • /
    • pp.317-324
    • /
    • 2009
  • The insecticidal toxin gene of Bacillus thuringiensis (Bt) is one of the most commonly used in the development of genetically modified (GM) crops. In this research, we analyzed Bt rice showing lepidopteran pest-resistance. The Bt gene is a synthetic Cry1Ac composed of optimal codons for plants, and the Bt protein is targeted to the chloroplast by a transit peptide. Three Cry1Ac rice events (C103-3, C127-1, and C7-1) were analyzed for molecular characterization. C103-3 contains two copies of T-DNA where the left border (LB) region is truncated. Both C7-1 and C127-1 have a single copy of T-DNA, but a part of the vector backbone DNA is inserted into the genome of C127-1; thus, only C7-1 had intact T-DNA. Progenies of C7-1 crossed with the original cultivar, Nakdong, and double-haploid lines from anther culture of lines crossed with the elite cultivar, Dongjin, were analyzed for T-DNA flanking genomic DNA and genotyping. Results showed that an intact T-DNA region without the vector backbone was inserted into the genome and was stably inherited through generations. The C7-1 homozygous event could be used as breeding material to develop GM rice with pest resistance.

Deep Learning-based Gaze Direction Vector Estimation Network Integrated with Eye Landmark Localization (딥 러닝 기반의 눈 랜드마크 위치 검출이 통합된 시선 방향 벡터 추정 네트워크)

  • Joo, Heeyoung;Ko, Min-Soo;Song, Hyok
    • Journal of Broadcast Engineering
    • /
    • v.26 no.6
    • /
    • pp.748-757
    • /
    • 2021
  • In this paper, we propose a gaze estimation network in which eye landmark position detection and gaze direction vector estimation are integrated into one deep learning network. The proposed network uses the Stacked Hourglass Network as a backbone structure and is largely composed of three parts: a landmark detector, a feature map extractor, and a gaze direction estimator. The landmark detector estimates the coordinates of 50 eye landmarks, and the feature map extractor generates a feature map of the eye image for estimating the gaze direction. And the gaze direction estimator estimates the final gaze direction vector by combining each output result. The proposed network was trained using virtual synthetic eye images and landmark coordinate data generated through the UnityEyes dataset, and the MPIIGaze dataset consisting of real human eye images was used for performance evaluation. Through the experiment, the gaze estimation error showed a performance of 3.9, and the estimation speed of the network was 42 FPS (Frames per second).

Detection and Trust Evaluation of the SGN Malicious node

  • Al Yahmadi, Faisal;Ahmed, Muhammad R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.89-100
    • /
    • 2021
  • Smart Grid Network (SGN) is a next generation electrical power network which digitizes the power distribution grid and achieves smart, efficient, safe and secure operations of the electricity. The backbone of the SGN is information communication technology that enables the SGN to get full control of network station monitoring and analysis. In any network where communication is involved security is essential. It has been observed from several recent incidents that an adversary causes an interruption to the operation of the networks which lead to the electricity theft. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we have introduced a machine learning based SVM method that detects malicious nodes in a smart grid network. The algorithm collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) classifies nodes into Normal or malicious nodes giving the statues of 1 for normal nodes and status of -1 for malicious -abnormal-nodes. Once the malicious nodes have been detected, we have done a trust evaluation based on the nodes history and recorded data. In the simulation, we have observed that our detection rate is almost 98% where the false alarm rate is only 2%. Moreover, a Trust value of 50 was achieved. As a future work, countermeasures based on the trust value will be developed to solve the problem remotely.

Modern Methods of Text Analysis as an Effective Way to Combat Plagiarism

  • Myronenko, Serhii;Myronenko, Yelyzaveta
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.242-248
    • /
    • 2022
  • The article presents the analysis of modern methods of automatic comparison of original and unoriginal text to detect textual plagiarism. The study covers two types of plagiarism - literal, when plagiarists directly make exact copying of the text without changing anything, and intelligent, using more sophisticated techniques, which are harder to detect due to the text manipulation, like words and signs replacement. Standard techniques related to extrinsic detection are string-based, vector space and semantic-based. The first, most common and most successful target models for detecting literal plagiarism - N-gram and Vector Space are analyzed, and their advantages and disadvantages are evaluated. The most effective target models that allow detecting intelligent plagiarism, particularly identifying paraphrases by measuring the semantic similarity of short components of the text, are investigated. Models using neural network architecture and based on natural language sentence matching approaches such as Densely Interactive Inference Network (DIIN), Bilateral Multi-Perspective Matching (BiMPM) and Bidirectional Encoder Representations from Transformers (BERT) and its family of models are considered. The progress in improving plagiarism detection systems, techniques and related models is summarized. Relevant and urgent problems that remain unresolved in detecting intelligent plagiarism - effective recognition of unoriginal ideas and qualitatively paraphrased text - are outlined.

Deep Learning-based Gaze Direction Vector Estimation Network Integrated with Eye Landmark Localization (딥러닝 기반의 눈 랜드마크 위치 검출이 통합된 시선 방향 벡터 추정 네트워크)

  • Joo, Hee Young;Ko, Min Soo;Song, Hyok
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2021.06a
    • /
    • pp.180-182
    • /
    • 2021
  • 본 논문은 눈 랜드마크 위치 검출과 시선 방향 벡터 추정이 하나의 딥러닝 네트워크로 통합된 시선 추정 네트워크를 제안한다. 제안하는 네트워크는 Stacked Hourglass Network[1]를 백본(Backbone) 구조로 이용하며, 크게 랜드마크 검출기, 특징 맵 추출기, 시선 방향 추정기라는 세 개의 부분으로 구성되어 있다. 랜드마크 검출기에서는 눈 랜드마크 50개 포인트의 좌표를 추정하며, 특징 맵 추출기에서는 시선 방향 추정을 위한 눈 이미지의 특징 맵을 생성한다. 그리고 시선 방향 추정기에서는 각 출력 결과를 조합하고 이를 통해 최종 시선 방향 벡터를 추정한다. 제안하는 네트워크는 UnityEyes[2] 데이터셋을 통해 생성된 가상의 합성 눈 이미지와 랜드마크 좌표 데이터를 이용하여 학습하였으며, 성능 평가는 실제 사람의 눈 이미지로 구성된 MPIIGaze[3] 데이터 셋을 이용하였다. 실험을 통해 시선 추정 오차는 0.0396 MSE(Mean Square Error)의 성능을 보였으며, 네트워크의 추정 속도는 42 FPS(Frame Per Second)를 나타내었다.

  • PDF

Cloning and Heterologous Expression of Acetyl Xylan Esterase from Aspergillus ficuum

  • Jeong, Hye-Jong;Park, Seung-Mun;Yang, Mun-Sik;Kim, Dae-Hyeok
    • 한국생물공학회:학술대회논문집
    • /
    • 2000.04a
    • /
    • pp.153-156
    • /
    • 2000
  • Xylan, the major hemicellulose component of many plants, occurs naturally in a partially acetylated form and lignin, the most resistant component in plant cell wall degradation, is also attached to ${\beta}-1,4-linked-D-xylose$ backbone through the ester linkage. Esterases are required to release the esterified substituent and acetyl esterases are important in the complete degradation of acetylated polysaccharides, like pectins and xylans. The gene(Axe) encoding acetyl xylan estarase(AXE) was isolated from genomic ${\lambda}$ library from Aspergillus ficuum. Nucleotide sequencing of the Axe gene indicated that the gene was separated with two intervening sequences and the amino acid sequence comparison revealed that it was closely related to that from A. awamori with the 92 % indentity. Heterologous expression of AXE was conducted by using YEp352 and Saccharomyces cerevisae 2805 as a vector and host expression system, respectively. The Axe gene was placed between GAL1 promoter and GAL7 terminator and then this recombinant vector was used to transform S. cerevisiae 2805 strain. Culture filtrate of the transformed yeast was assayed for the presence of AXE activity by spectrophotometry and, comparing with the host strain, four to five times of enzyme activity was detected in culture filtrate of transformed yeast.

  • PDF

High-Frequency Targeted Mutagenesis in Pseudomonas stutzeri Using a Vector-Free Allele-Exchange Protocol

  • Gomaa, Ahmed E.;Deng, Zhiping;Yang, Zhimin;Shang, Liguo;Zhan, Yuhua;Lu, Wei;Lin, Min;Yan, Yongliang
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.2
    • /
    • pp.335-341
    • /
    • 2017
  • The complexity of the bacterial recombination system is a barrier for the construction of bacterial mutants for the further functional investigation of specific genes. Several protocols have been developed to inactivate genes from the genus Pseudomonas. Those protocols are complicated and time-consuming and mostly do not enable easy construction of multiple knock-ins/outs. The current study describes a single and double crossover-recombination system using an optimized vector-free allele-exchange protocol for gene disruption and gene replacement in a single species of the family Pseudomonadaceae. The protocol is based on self-ligation (circularization) for the DNA cassette which has been obtained by overlapping polymerase chain reaction (Fusion-PCR), and carries an antibiotic resistance cassette flanked by homologous internal regions of the target locus. To establish the reproducibility of the approach, three different chromosomal genes (ncRNA31, rpoN, rpoS) were knocked-out from the root-associative bacterium Pseudomonas stutzeri A1501. The results showed that the P. stutzeri A1501 mutants, which are free of any plasmid backbone, could be obtained via a single or double crossover recombination. In order to optimize this protocol, three key factors that were found to have great effect on the efficiency of the homologous recombination were further investigated. Moreover, the modified protocol does not require further cloning steps, and it enables the construction of multiple gene knock-in/out mutants sequentially. This work provides a simple and rapid mutagenesis strategy for genome editing in P. stutzeri, which may also be applicable for other gram-negative bacteria.

Performance Evaluation of a Time- and Frequency-Domain Clipping-Based PAPR Reduction Scheme in a DVB-T System (DVB-T 시스템에서 시간 및 주파수 영역 클리핑 기반의 PAPR 감소기법의 성능평가)

  • Seo, Man-Jung;Im, Sung-Bin;Kim, Na-Hoon;Cho, Jun-Kyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.1
    • /
    • pp.24-31
    • /
    • 2007
  • DVB-T (Digital Video Broadcasting-Terrestrial) is an important multimedia broadcasting technology capable of high data-rate transmission and adopted by Europe. OFDM (Orthogonal Frequency Division Multiplexing) is the backbone technique employed in DVB-T to support multimedia services that have various bandwidths. Unfortunately, an OFDM signal has a large PAPR (Peak-to-Average Power Ratio). In this paper, we investigate the performance of a simple PAPR reduction scheme for the DVB-T system, which requires no change of a receiver structure or no additional information transmission. The approach we employed is clipping in the time and frequency domains. The time-domain clipping is carried out with a predetermined clipping level while the frequency-domain clipping is done within EVM (Error Vector Magnitude). This approach is suboptimal with lower computational complexity compared to the optimal method. The simulation results demonstrate that the proposed one is getting more effective at lower modulation levels and with more allowed constellation error.

A Study on the Implement of Test Bed for Ad-hoc Networks (Ad-hoc 네트워크 테스트 베드 구현에 관한 연구)

  • Lee, Heung-Jae;Ga, Soon-Mo;Choe, Jin-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1059-1067
    • /
    • 2006
  • AODV(Ad-hoc On-demand Distance Vector) routing protocol was devised for use of mobile nodes in Ad-hoc network. When we use the AODV routing protocol in Ad-hoc networks with high mobility, disturbance of optimized route path and link break occur. In order to solve the shortcomings, this paper proposes a new routing protocol in which new routing control messages are added to the existing AODV. The proposed protocol minimizes link break and transmission delay while is able to secure the optimized route path constantly in changes of network topology The performance of the proposed routing protocol was evaluated by using us2 network simulator. The actual Ad-hoc network test bed provides us the most reliable experimental data for Ad-hoc networks. In order to support this experimental environment, the dissertation also developed an efficient embedded system on which AODV routing protocol, NAT, Netfilter can run and other event message can be verified without declining efficiency. The correct operation of AODV routing protocol has been verified in both the Ad-hoc network test bed in which the embedded system was used, and Ad-hoc networks linked with Ethernet backbone network.